Introduction
Effective management of access rights is crucial to maintaining the integrity and security of any
system. This document emphasizes the importance of adhering to best practices when assigning
permissions within the C•CURE 9000 security-management system. Granting permissions beyond
the necessary scope can lead to unauthorized access and potential misuse of information.
Therefore, it is imperative to assign each account only the roles and permissions required to
perform their specific job functions, and nothing more. This approach ensures that the system
remains secure, and that information is protected from unwanted changes.

As cybersecurity threats affect all connected devices, it is important to ensure that cybersecurity
is considered throughout the planning, deployment and maintenance phases associated with a
solution’s functional operation.
Legal disclaimer
The cybersecurity practices described in this guide are recommended practices to facilitate the secure
installation and configuration of the products described herein. However, Johnson Controls cannot guarantee
that the implementation of the cybersecurity practices or recommendations described in this guide will ensure
the security of the relevant product or system, or prevent, or alter the potential impact of any unauthorized
access or damage caused by a cybersecurity incident. This guide is provided “as is”, and Johnson Controls
makes no representation or warranty, express or implied, as to the efficacy of the cybersecurity practices or
recommendations described in this guide. Johnson Controls disclaims all liability for any damages that may
occur as a result of, or despite, reliance on this guide or compliance with any cybersecurity practices or
recommendations set forth herein.
C•CURE 9000 Configuration Overview
This section helps C•CURE 9000 administrators implement best practices for a secure C•CURE 9000 v3.10
system installation. You will learn what is needed to get the CrossFire service to run on your system, while
avoiding the security risks created by granting excessive privileges.
wechat/whatsapp:
Email: kongjiangauto@163.com
Copyright © 2009 - 2024 Cld , All Rights Reserved K-JIANG All rights reserved